{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T08:52:44Z","timestamp":1769763164336,"version":"3.49.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100009614","name":"Petroleum Technology Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009614","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,20]]},"DOI":"10.1109\/isncc49221.2020.9297267","type":"proceedings-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T22:06:21Z","timestamp":1608933981000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Security Analysis of IoT Networks and Platforms"],"prefix":"10.1109","author":[{"given":"Stephen","family":"Ugwuanyi","sequence":"first","affiliation":[]},{"given":"James","family":"Irvine","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956062"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/RWS.2018.8304963"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAS.2019.8703630"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904799"},{"key":"ref31","article-title":"TS 133 401 - V10.3.0 - Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; 3GPP System Architecture Evolution (SAE); Security architecture (3GPP TS 33.401 version 10.3.0 Release 10)","year":"2012"},{"key":"ref30","first-page":"2","article-title":"Coverage and capacity analysis of LTE-M and NB-IoT in a rural area","volume":"20","author":"lauridsen","year":"2017","journal-title":"IEEE Veh Technol Conf"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916180"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s19112613"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783703"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2751586"},{"key":"ref10","article-title":"Techmeme: IoT device vendor Wyze says a server leak exposed data, including email addresses, camera user IDs, and WiFi SSIDs, of ~2.4M customers from Dec. 4 to Dec. 26 (Catalin Cimpanu\/ZDNet)","year":"0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2019.00060"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2649687"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEMR.2014.7043637"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700625"},{"key":"ref14","article-title":"Security Management for The Internet of Things","author":"chen","year":"2017","journal-title":"ProQuest Diss Publ"},{"key":"ref15","first-page":"180","article-title":"Internet of Things: Security vulnerabilities and challenges","volume":"2016 febru","author":"andrea","year":"2016","journal-title":"Proc - IEEE Symp Comput Commun"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMTECH.2017.8065757"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.17"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890229"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IOTA.2016.7562744"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2720635"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875594"},{"key":"ref3","first-page":"1","article-title":"IoT-based Context-Aware Intelligent Public Transport System in a metropolitan area","author":"chavhan","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1109\/APAP47170.2019.9224668","article-title":"Design of an Open Platform for Real-Time Power Grid Monitoring","author":"hong","year":"2019"},{"key":"ref29","article-title":"Narrowband internet of things whitepaper","author":"schlienz","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2879579"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323679"},{"key":"ref7","article-title":"Bad Rabbit: Game of Thrones-referencing ransomware hits Europe | Technology | The Guardian","author":"hern","year":"2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2870068"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151336"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849859"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/9781119193784.ch5"},{"key":"ref45","article-title":"DS\/IEC\/TS 62351-5:2013 - Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives","year":"0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WITS.2017.7934655"},{"key":"ref42","first-page":"39","article-title":"Hybrid Cryptographic Technique U Sing Rsa","volume":"6","author":"shankar","year":"2014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2015.7392493"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICABCD.2019.8851004"},{"key":"ref23","article-title":"Security and Trust Challenges in the Area of IoT","author":"pietro","year":"2012","journal-title":"Innosummit"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7785322"},{"key":"ref26","article-title":"Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications","volume":"3203","author":"wang","year":"2017"},{"key":"ref43","article-title":"Comparative Study of Different Cryptographic Algorithms for Data Security in Cloud Computing","author":"sharma","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2931724"}],"event":{"name":"2020 International Symposium on Networks, Computers and Communications (ISNCC)","location":"Montreal, QC, Canada","start":{"date-parts":[[2020,10,20]]},"end":{"date-parts":[[2020,10,22]]}},"container-title":["2020 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9297148\/9297168\/09297267.pdf?arnumber=9297267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T09:08:44Z","timestamp":1670576924000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9297267\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/isncc49221.2020.9297267","relation":{},"subject":[],"published":{"date-parts":[[2020,10,20]]}}}